Fri.Jun 23, 2017

article thumbnail

The Blockchain Revolution: Where’s the Disruption?

Data Center Knowledge

This year blockchains seem to be off the public radar. Much of that is because the complexity of both the technology and its uses don't lend itself to overnight adoption. Read More.

IBM 241
article thumbnail

Datacentre decisions: Converged vs hyper-converged infrastructure

Computer Weekly

Converged and hyper-converged infrastructure are ready-tested ways to put compute and storage into the datacentre. But which should you choose for your deployment?

Storage 231
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Planning for the New Windows Server Cadence

Data Center Knowledge

The next version of Windows Server will let you run Linux containers using Hyper-V isolation (and connect to them with bash scripts), encrypt network segments on software-defined networks and deploy the Host Guardian Service as a Shielded VM rather than needing a three-node physical cluster. Data.

Windows 205
article thumbnail

MicroStrategy CEO Michael Saylor speaks about ‘expanding universe’ of BI

Computer Weekly

Co-founder and CEO of MicroStrategy takes the long view on business intelligence and sees its universe expanding with mobile technologies

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Packet, Qualcomm to Host World’s First 10nm Server Processor in Public Cloud for Developers

Data Center Knowledge

Packet, a bare metal cloud for developers, announced that it will collaborate with Qualcomm Datacenter Technologies, Inc. to introduce the latest in server architecture innovation on the 48-core Qualcomm Centriq 2400 processor. The New York City-based company is currently showcasing its consumable.

article thumbnail

Housing developer rolls out HCM to pave way for stock market listing

Computer Weekly

Bonava, which provides affordable and sustainable housing in Northern and Eastern Europe, rolled out HR technology in record time to meet a deadline to list on the Stockholm Stock Exchange

More Trending

article thumbnail

Why entrepreneurship is the only escape from AI-fuelled unemployment

Computer Weekly

Mark Carney, governor of the Bank of England, predicts up to 15m people could lose their jobs due to AI.

Banking 260
article thumbnail

Foxconn Dangles $10 Billion Tech Investment to Create U.S. Jobs

Data Center Knowledge

The world’s largest maker of iPhones is readying $10 billion or more of investment across several U.S. states. Read More.

article thumbnail

Security Think Tank: Strategise, prioritise, automate and use cloud to improve patching

Computer Weekly

How should organisations address the need to keep software up to date with security patches without it costing too much or being too labour intensive?

Security 214
article thumbnail

Traditional or Convertible - Two Common Laptop Types Explained

IT Toolbox

Traditionally, laptops had only one function. They were, well, just laptops: the lid was opened, revealing the screen to look at and keyboard to type with. This was the norm of mobile computing until a few years back, when new kind of laptops started to pop up in the marketplace.

Mobile 149
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Swedish fintech Klarna gains full banking licence

Computer Weekly

Swedish online payments provider Klarna becomes one of “the largest banks in Europe” after being granted an EU-wide banking licence by the Swedish Financial Supervisory Authority

Banking 181
article thumbnail

Google Will Stop Reading Your Emails for Gmail Ads

Data Center Knowledge

Google is stopping one of the most controversial advertising formats. Read More.

Google 203
article thumbnail

Côte banishes planning ‘pain and anguish’ from menu with Anaplan

Computer Weekly

Restaurant chain has replaced spreadsheets with Anaplan financial planning software as it seeks more strategic control over growth

Financial 208
article thumbnail

Beware that Adobe Flash update on your Android device: It could be malware

Tech Republic Security

A variant of Android malware Marcher has been spotted masquerading as a Flash update. Here's what you need to know about this dangerous, well-disguised threat.

Malware 148
article thumbnail

20 Common Mistakes Made by Inexperienced Project Managers

You’ve read the PMBOK® Guide several times, taken the certification exam for project managers, passed, and you are now a PMP®. So why do you keep making rookie mistakes? This whitepaper shows 20 of the most common mistakes that young or inexperienced project managers make, issues that can cost significant time and money. It's a good starting point for understanding how and why many PMs get themsleves into trouble, and provides guidance on the types of issues that PMs need to understand.

article thumbnail

Why users don't always know what they need

Computer Weekly

The economic concept of revealed preference can often tell IT managers more about what their users want than users themselves

189
189
article thumbnail

Get your facts straight!

IT Toolbox

As you probably know I write programs for a living. More specifically I write programs which interact and control different devices. These varied devices are often controlled by their own firmware. Firmware is just another name for a program which has been installed on the device to control it and is not changeable by the normal user.

article thumbnail

One year on and one week in - what does Brexit mean for tech?

Computer Weekly

A good Brexit deal for the UK will rely on getting a good deal for the UK tech sector

225
225
article thumbnail

Facebook debuts new tools to keep your profile photos from being stolen

Tech Republic Security

In an effort to put an end to catfishing and other abuses of stolen profile photos, Facebook has introduced a new photo guard and photo designs to deter misuse.

Tools 130
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Russian hackers traded thousands of UK officials’ credentials

Computer Weekly

Login credentials of tens of thousands of UK officials were traded online after a 2012 data breach at LinkedIn, an investigation has revealed

Data 167
article thumbnail

Ringless voicemail messaging: Why advocates are speaking out for and against it

Tech Republic Security

In the US, controversy once again erupts between privacy groups and telemarketers. This time it's about ringless voicemail messaging and the ability to put messages onto mobile phones without calling.

Mobile 114
article thumbnail

It's time to upgrade to TLS 1.3 already, says CDN engineer

Network World

Businesses dragging their heels over rolling out TLS 1.2 on their website might have an excuse to delay a little longer: Version 1.3 of the TLS (Transport Layer Security) encryption protocol will be finalized later this year, and early deployments of it are already under way. TLS, the successor to SSL, is used to negotiate secure connections to web or mail servers, encrypting data on the move.

article thumbnail

Video: The Global Cybersecurity Summit aims to address the world's most urgent cybersecurity challenges

Tech Republic Security

Ryan Brack, senior vice president of Mercury Public Affairs explains how the Global Cybersecurity Summit in Kiev, Ukraine united private sector, government, academic, and non-profit cybersecurity experts and ideas

Video 101
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Testing your Big Data Application - Part 3

IT Toolbox

Part 3: Executing a Big Data Systems Test

Big Data 157
article thumbnail

Microsoft Hyper-V: The smart person's guide

Tech Republic Data Center

This resource guide covers essential Hyper-V information, including features, system requirements, and how Microsoft's virtualization platform impacts the enterprise and its server infrastructure.

article thumbnail

Oracle's Birthday - The Big Four-Oh

IT Toolbox

FIFO-FIFO, it's off to work I go.

Oracle 113
article thumbnail

How Faulty Data Breaks Your Machine Learning Process

Dataconomy

This article is part of a media partnership with PyData Berlin, a group helping support open-source data science libraries and tools. To learn more about this topic, please consider attending our fourth annual PyData Berlin conference on June 30-July 2, 2017. Miroslav Batchkarov and other experts will be giving talks. The post How Faulty Data Breaks Your Machine Learning Process appeared first on Dataconomy.

Data 78
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

DHS, Google put up $1.5M for data scientists to improve airport security with neural networks

Tech Republic Big Data

A competition hosted on the data science community site, Kaggle, seeks to improve the Department of Homeland Security's threat recognition algorithms.

article thumbnail

Sovrin Status: Alpha Network Is Live

Phil Windley

Summary: The Sovrin Network is live and undergoing testing. This Alpha Stage will allow us to ensure the network is stable and the distributed nodes function as planned. Sovrin is based on a permissioned distributed ledger. Permissioned means that there are known validators that achieve consensus on the distributed ledger. The validators are configured so as to achieve Byzantine fault tolerance but because they are known, the network doesn't have to deal with Sybil attacks.

Network 65
article thumbnail

Become your company's data and analytics expert

Tech Republic Big Data

Access a library of over 130 courses covering SAS, Oracle, R, and more.

Oracle 96